1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P5 doc

10 471 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 106,86 KB

Nội dung

xl Sawhney, 2000). eHubs create value by aggregating buyers and sellers, creating marketplace liquidity, and reducing transaction costs. :KLOHPDQ\¿UPVEHOLHYHHPDUNHWSODFHVZLOOEULQJEHQH¿WVPDQ\HPDUNHWSODFHVVXIIHUHGIURP WKHLULQDELOLW\WRJHQHUDWHVXI¿FLHQWUHYHQXHIURPWKLQWUDQVDFWLRQYROXPHV6XUYLYLQJHPDUNHWSODFHV are struggling to present compelling value propositions for participants. Hence, e-marketplaces need to LGHQWLI\SRWHQWLDOVRXUFHVRIYDOXHVWRVWD\LQWKHEXVLQHVVLQFOXGLQJHI¿FLHQWDOORFDWLRQRIUHVRXUFHV improved information collection and aggregation, quality service, and risk management. As e-business business models and technologies develop, the supply chain dimension of e-business, called e-supply chain, has become one of the most discussed topics in the various industries (Kim et al., 2005; Nath & Angeles, 2005). E-supply chain emerged as a promising alternative to traditional supply chain and dramatically changed the way procurement is conducted. E-supply chain also opens up new opportunities for SMEs, considering the traditional proprietary EDI technology was not available for most SMEs. A study of organizational barriers to e-supply chain integration revealed that (1) internal bar- riers impeded e-integration more than either upstream supplier barriers or downstream customer barriers would and (2) e-integration has a positive effect on the performance (Frohlich, 2002). These barriers to LPSOHPHQWDWLRQDQGRUJDQL]DWLRQDOLVVXHVQHHGWREHDGGUHVVHGWRUHDOL]HSRWHQWLDOEHQH¿WV (VXSSO\FKDLQHQKDQFHVVXSSO\FKDLQÀH[LELOLW\PXFKQHHGHGLQWLPHVRIK\SHUFRPSHWLWLYHEXVL- ness environments, sophisticated customer preferences, and widespread use of disruptive technologies. Based on a survey result of supply chain relationships in the IT industry, Gosain, et al. (2004) proposed two e-supply chain design principles: (1) modular design of interconnected processes and structured data connectivity, and (2) deep coordination-related knowledge. They also suggested that sharing a broad UDQJHRILQIRUPDWLRQZLWKSDUWQHUVLVFRXQWHUSURGXFWLYHWRVXSSO\FKDLQÀH[LELOLW\DQGWKDWRUJDQL]DWLRQV should instead enhance information quality. Business-to-Consumer (B2C) E-Commerce B2C e-commerce created many successful e-commerce startups with unique business models such as eBay, Amazon.com, and expedia.com. B2C e-commerce is characterized by intense competition, low market entry barriers, and a low degree of customer loyalty, which in part are the reason behind the de- mise of numerous B2C e-commerce startups in the late 1990s and early 2000s. Due to the rapid growth of the Internet population and online sales, most traditional retailers have been transformed into click and mortar organizations by establishing the B2C ecommerce web sites. For these B2C e-commerce organizations, understanding online consumer behavior is one of the most important tasks for their business success. To understand online consumer behavior, a number of researchers have applied grounded theories and investigated web site characteristics, motivations, facilitators, inhibitors, trust, attitude, intention, and loyalty which underlie individual acceptance of B2C e-commerce applications (Kulviwat et al., 2006; Jih, 2007). Most of these empirical studies adapted Theory of Planned Behavior (TPB), Technol- ogy Acceptance Model (TAM), and SERVQUAL which have been widely used in IT adoption studies. 7KHVHVWXGLHVVKRZHGWKDWFRQVXPHU¶VDFFHSWDQFHRIHFRPPHUFHLVLQÀXHQFHGE\VXEMHFWLYHQRUPV perceived usefulness, perceived site quality, risk, vendor quality, security, reliability, assurance, privacy, and user’s web experience. ,QDGGLWLRQWRWKHDERYHPHQWLRQHGHFRPPHUFHDFFHSWDQFHVWXGLHVDQXPEHURIVWXGLHVVSHFL¿- cally focused on trust issues in e-commerce (Bhattacherjee, 2006; Pollard & Diggles, 2006). Four main xli DQWHFHGHQWVDUHNQRZQWRLQÀXHQFHRQFRQVXPHUWUXVWLQ%&HFRPPHUFH/HH7XUEDQWUXVW- worthiness of the Internet merchant, trustworthiness of the Internet as a shopping medium, infrastructural FRQWH[WXDOIDFWRUVDQGRWKHUIDFWRUVVXFKDVFRPSDQ\VL]HDQGGHPRJUDSKLFYDULDEOHV7KHVH¿QGLQJV indicate that merchant integrity is a major positive determinant of consumer trust in online shopping, and that its effect is moderated by the individual consumer’s trust propensity. Psychological antecedents of LQVWLWXWLRQEDVHGWUXVWDUHFDWHJRUL]HGLQWR¿YHJURXSVRIIDFWRUVSHUVRQDOLW\EDVHGSHUFHSWLRQEDVHG attitude-based, experience-based, and knowledge-based (Walczuch & Lundgren, 2004). Perception-based factors were found to be the main determinants of consumer trust in e-retailing. As B2C e-commerce technologies advance and consumers gain more online experience, e-services have drawn attention from researchers and practitioners (Gefen & Straub, 2003; Baida et al., 2007). E-services enhance consumers’ online shopping experience, and include Internet radio, web-based de- cision support, personalization, e-payment, online inquiry, electronic document sharing, and e-product support services. One of the major drawbacks of e-services is that e-services frequently lack a social SUHVHQFH)LQGLQJVRIDIUHHVLPXODWLRQH[SHULPHQWVKRZHGWKHSRVLWLYHLQÀXHQFHRIVRFLDOSUHVHQFHRQ trust and its ultimate contribution to online purchase intentions of e-services (Gefen & Straub, 2003). $QRWKHUVWXG\LQGLFDWHGWKDWVHUYLFHFRQYHQLHQFH:HEVLWHVHUYLFHTXDOLW\DQGULVNDUHVLJQL¿FDQWIDF- tors affecting consumers’ satisfaction level, which in turn affects intention to use e-services (Zhang & Prybutok, 2005). C2C (Consumer-to-Consumer) E-Commerce C2C e-commerce supports direct business transactions and information exchange between and among consumers. While the transaction volume of C2C e-commerce is relatively new and behind B2C and B2B, it is growing rapidly. The most successful example of a C2C e-commerce application is online DXFWLRQ2WKHU&&DSSOLFDWLRQVLQFOXGHMREERDUGVDQG¿OHVKDULQJ&&FRPPHUFHH[LVWHGORQJEH- fore the advent of e-business. The oldest form of C2C commerce is bartering that existed before people started to use currency. More contemporary types of C2C commerce include newspaper advertisements and traditional auctions. While C2C e-commerce creates many opportunities such as disintermediation and an expanded pool of buyers and sellers, it also brings with it a number of challenges (Strader, T., & Ramaswami, S., 2002). These challenges include connecting buyers and sellers, trust issues, and issues with payment methods. While the main actors in C2C commerce are buyers and sellers, the presence of trusted interme- diaries is required to provide infrastructure for C2C e-commerce activities. Amazon.com and eBay are examples of successful C2C intermediaries whose revenue source is commissions paid by sellers. Reputation systems are used by C2C intermediaries to enhance trust. Unlike in B2C reputation systems where only consumers rate the e-commerce companies, evaluation in C2C reputation systems is two- way. Both buyers and sellers are able to rate their experience with the trading party. Then, evaluations DUHDYDLODEOHWRDOORWKHUXVHUV5HSXWDWLRQV\VWHPVDUHEHQH¿FLDOWRERWKEX\HUVDQGVHOOHUVWKH\FDQ be used to predict sellers’ behaviors (Bruce et al., 2004); they can be also used to predict the success of buyers’ transaction (Dholakia, 2005) Consumer-to-consumer (C2C) e-commerce is a growing area of e-commerce. While B2C auction has been widely studied, C2C auction has been understudied. When studying online auction, a phenomenon FDOOHGWKH³ZLQQHU¶VFXUVH´FDQRIWHQEHREVHUYHG$ZLQQHU¶VFXUVHPHDQVWKHEX\HUDQDXFWLRQZLQQHU HQGVXSSD\LQJPRUHWKDQWKHPLQLPXP¿[HGSULFHIRULGHQWLFDOSURGXFWV6WXGLHVVKRZWKDWQHDUO\ percent of auction participants suffer from the winner’s curse for certain commodities (Oh, 2002) xlii Three constructs from B2C research have been adapted to study satisfaction in C2C e-commerce (Jones & Leonard, 2007). The constructs include elements of the technology acceptance model (TAM), which includes perceived ease of use and usefulness; transaction cost analysis (TCA), which includes XQFHUWDLQW\DVVHWVSHFL¿FLW\DQGWLPHDQGVHUYLFHTXDOLW\6(5948$/ZKLFKLQFOXGHVUHOLDELOLW\ responsiveness, assurance, and empathy. The results show that TAM, TCA, and SERVQUAL all impact VDWLVIDFWLRQLQ&&HFRPPHUFH5HOLDELOLW\DQGUHVSRQVLYHQHVVLQÀXHQFHVDWLVIDFWLRQLQ&&HFRP- merce. ELECTRONIC BUSINESS DEVELOPMENT AND DESIGN METHODOLOGIES This section presents frameworks for e-business applications and design methodologies for e-business applications development. Frameworks for E-Business Applications Many of the information technology (IT) frameworks were developed before the advent of e-commerce. As electronic commerce grew rapidly and gained strategic importance, the existing IT infrastructure became inadequate in supporting the complex capabilities of e-business applications that need to lever- DJHLQWHU¿UPSURFHVVDQGIURQWHQGDQGEDFNHQGV\VWHPLQWHJUDWLRQ)XUWKHUPRUHGXHWRWKHYDULHW\ RIH[LVWLQJHEXVLQHVVPRGHOVLWVHHPVGLI¿FXOWWR¿QGDZLGHO\DFFHSWHGFDWHJRUL]DWLRQWKDWFDQEH analysed and assessed (Raisinghani et al., 2005). Bichler et al. (1998) are early researchers who in- vestigated the concept of component-based e-commerce technology as a solution to the e-commerce challenge at both system and application levels. Compared to a large pre-packed monolithic system equipped with all-encompassing features, component-based systems consist of a lightweight kernel to ZKLFKQHZIHDWXUHFRPSRQHQWVFDQEHDGGHGG\QDPLFDOO\5HDOL]LQJWKDWPDQ\¿UPVIDLOWRSURSHUO\SODQ WKHLUHFRPPHUFH,7LQIUDVWUXFWXUH5DJKXQDWKDQDQG0DGH\GHYHORSHGD¿UPOHYHOHEXVLQHVV management framework with six components: organizational e-commerce strategy, business processes transformation, information technology management, information management, customer management, and organizational knowledge management. The framework emphasizes component interrelationships to planning an e-business information systems infrastructure. In a similar modeling approach, an e-business architecture planning model was proposed with 12 generic e-business models and three axes of timeliness, FRPPXQLW\DQGLQWHJUDWLRQXSRQZKLFKGULYHUVRIWKHLQIRUPDWLRQDUFKLWHFWXUDOQHHGVRIHEXVLQHVV¿UPV fall. It was augmented with Sowa and Zachman’s Information Systems Architecture (1992) to further facilitate e-business information systems architecture planning (Pant and Ravichandran, 2001). As e-business places greater emphasis on IT infrastructure, IT managers need to assess infrastructure and prioritize investment options more carefully. Weill and Vitale (2002) investigated the relationships between e-business models (namely, content provider, direct to customer, full service provider, inter- mediary, value net integrator, virtual community, whole of enterprise, government) and nine main IT infrastructure services (applications infrastructure, communications, data management, IT management, security, architecture and standards, channel management, IT research and development, IT education). Their analysis indicated certain business models require different IT infrastructures. Design Methodologies for E-Business Applications Development Traditional IT development approaches such as systems development life-cycle (SDLC) methods and functional team IT organization were outdated long before the advent of the digital economy. In response xliii to the drawbacks of the traditional IT development approaches, various alternative systems development methods such as rapid application development (RAD) and object-oriented systems development were introduced in 1990s. While these new systems development methods, as well as the traditional IT de- velopment approaches, are used for e-business application projects, e-business application development presents unique challenges to systems designers. For example, there are differences in the preference for the type of virtual communities and the tool used by Chinese and U.S. communities, indicating that designers of global virtual communities must treat cultural differences with caution (Tan et al., 2006). Planning and designing an enterprise-wide database system for e-business is a critical task for the suc- cess of e-business oriented organizations (Yap, 2007). ,QWHUQHWFRPPHUFHGHYHORSPHQWPHWKRGRORJ\,&'0LGHQWL¿HVWKHPDLQUHTXLUHPHQWVRIPHWKRG- ologies for developing e-commerce applications and addresses a number of issues in many traditional V\VWHPVGHYHORSPHQWPHWKRGRORJLHVLGHQWL¿HGZLWKLQWKHOLWHUDWXUH6WDQGLQJ,&'0DGRSWVDQ HYROXWLRQDU\DSSURDFKWRV\VWHPVGHYHORSPHQWZKHUHVXEV\VWHPVSHFL¿FDSSURDFKHVFDQEHLQWHJUDWHG can address business and strategic focus, and can include a management structure as well as engineering aspects of e-commerce application development. Web quality metrics have been developed to evaluate the quality of web sites (Barnes & Vidgen, 2002). Developing web quality index and measuring web quality can help stakeholders understand and improve e-business web sites. Web quality metrics have been developed and validated through various e-business applications. Some of the dimensions include web site usability, information quality, and service interaction quality. WebQual is grounded in the perceptions of web site users, and analysis of data collected from users is used to guide web site design. (VHUYLFHVDUHLQWDQJLEOHDQGLWLVPRUHGLI¿FXOWWRGHVLJQDZHEVLWHIRUHVHUYLFHVWKDQSURGXFWRI- fering web sites (Baida et al., 2007). Furthermore, because most e-services involve multiple enterprises, creating a shared understanding of the service under consideration is a challenging task (Gordijn et al., 7KH¿UVWVWHSLQWKHHVHUYLFHVGHYHORSPHQWLVWRXQGHUVWDQGWKHHVHUYLFHLWVHOIEHIRUHWKH\FDQ build effective systems and support for these services. The complementary use of two requirements en- gineering techniques was recommended by using i * modeling, developers can explore strategic goals WKDW¿UPVKDYHDQGE\XVLQJH 3 YDOXHPRGHOLQJWKH\XQGHUVWDQGKRZWKHVHJRDOVFDQUHVXOWLQSUR¿WDEOH services for enterprises. ELECTRONIC BUSINESS TOOLS AND TECHNOLOGIES This section discusses web technology standards, agent technologies, and digital rights management (DRM) systems. Web Technology Standards One way to promote widespread adoption of e-business is to develop technology standards that can be XVHGWRPDNHLQIRUPDWLRQÀRZVHDPOHVVO\EHWZHHQDQGZLWKLQRUJDQL]DWLRQV([WHQVLEOH0DUNXS/DQ- guage (XML) is a simple, extendible text format derived from SGML. XML is extensible because it is QRWD¿[HGIRUPDWOLNH+70/HJGHYHORSHUVFDQFUHDWHWKHLURZQWDJVLQ;0/2ULJLQDOO\GHVLJQHG to meet the challenges of large-scale electronic publishing, XML allows the exchange of a wide variety of data on the Web and elsewhere and has become one of the key components in e-business systems integration (World Wide Web Consortium (W3C) Extensible Markup Language, 2008). A number of variations of XML have been developed. For example, eXtensible Business Reporting Language (XBRL) is an XML-based open standard which can be used to facilitate the process of the production, consump- xliv WLRQDQGH[FKDQJHRI¿QDQFLDOLQIRUPDWLRQDPRQJEXVLQHVVRUJDQL]DWLRQVVRIWZDUHDSSOLFDWLRQVDQG accounting standards (Troshani & Rao, 2007). Agent Technologies In the agent-mediated electronic commerce, the roles of agents for online consumers included product brokering, merchant brokering, and negotiation (Guan & Zhu, 2007). Other agent technologies also LGHQWL¿HGZHUHVXSSO\FKDLQPDQDJHPHQWDJHQWVPRELOHDJHQWVHYROXWLRQDU\DJHQWVDQGGDWDPLQLQJ agents. He et al. (2003) analyzed state of the art agent-mediated e-commerce. The roles of agents in %%HFRPPHUFHZHUHLGHQWL¿HGLQSDUWQHUVKLSIRUPDWLRQEURNHULQJDQGQHJRWLDWLRQ+DYLQJLGHQWL- ¿HGWKHUROHVIRUDJHQWVLQ%&DQG%%HFRPPHUFHVRPHRIWKHNH\XQGHUO\LQJWHFKQRORJLHVZHUH highlighted. Papazoglou (2001) studied basic characteristics of e-business agents. Two major characteristics discussed were that an agent must have a model of its own domain of expertise, and that an agent must have a model of the other agents that can provide relevant information. E-business agents that possess intelligence exhibit distinguishing characteristics: delegation abilities and communication ability. Agents were categorized into four types depending on their functionality and competencies: application agents, system-level support agents, personal agents, and general business activity agents. 1HJRWLDWLRQLVDSURPLVLQJ¿HOGZKHUHHOHFWURQLFDJHQWVFDQEHXVHG(OHFWURQLFQHJRWLDWLRQVFDQ involve simple bartering to complex negotiation strategies concerning multiple product and service packages. Combined negotiations are applied when negotiators are interested in many goods or services simultaneously and engage in multiple negotiations at the same time. A Combined Negotiation Support System (CNSS) called CONSENSUS was developed to help negotiators conduct multiple negotiations simultaneously, which without software support put a considerable burden of coordinating and reconciling multiple negotiations on the agents (Benyoucef et al., 2001). The architecture of CONSENSUS consists RIZRUNÀRZWHFKQRORJ\QHJRWLDWLQJVRIWZDUHDJHQWVDQGUXOHHQJLQHWHFKQRORJ\6HPDQWLF:HEWHFKQRO- ogy was applied to automated negotiation for which negotiation agents are deployed (Tamma, 2005). Negotiation protocols were not hard-coded in the negotiation agents, but were expressed in terms of a shared ontology with an explicit and declarative representation of the negotiation protocol. Since agents have very little prior knowledge of the protocol, they were designed to acquire negotiation knowledge directly from the marketplace. Digital Rights Management (DRM) Systems Online delivery of creative digital media, such as audio or video, is now an important part in the music and publishing industries. Due to the possibility of unlimited copying in the digital domain and breach of intellectual property rights, digital rights management (DRM) systems have been developed to control the way digital content is used (Hartung & Ramme, 2000). DRM systems typically incorporate access control technologies such as encryption, conditional access, copy control mechanisms, and media iden- WL¿FDWLRQDQGWUDFLQJPHFKDQLVPV'LJLWDOZDWHUPDUNLQJZKLFKLVWKHSURFHVVRIHPEHGGLQJDX[LOLDU\ information into a digital signal, is an essential component of modern DRM systems. Several water- marking methods are available including spread-spectrum, quantization, and amplitude modulation. To enhance the robustness of digital watermarking, a watermarking scheme that utilizes error correction codes based on the redundant residue number system was proposed (Goh & Siddiqi, 2007). xlv ELECTRONIC BUSINESS UTILIZATION AND APPLICATION This section discusses recommender systems, web personalization, web mining, organizational learning and knowledge management, and mobile computing. Recommender Systems 5HFRPPHQGHUV\VWHPVDUHEHLQJXVHGE\PDQ\LQQRYDWLYHHFRPPHUFH¿UPVVXFKDV$PD]RQFRP eBay, and Blockbuster to make personalized recommendations for products or services. Schafer et al. (2001) created taxonomy of recommender systems, based on a number of sources including the inputs required from the consumers, the additional knowledge required from the database, the ways the rec- ommendations are presented to consumers, the technologies used to create the recommendations, and the level of personalization of the recommendations. Recommender systems are very suitable for use in e-commerce due to easily obtainable consumer preference data. To overcome the information overload of online shoppers, a variety of recommendation methods have been developed including collaborative ¿OWHULQJFOXVWHUPRGHOVDQGVHDUFKEDVHGPHWKRGV &ROODERUDWLYH¿OWHULQJ&)LVWKHPRVWVXFFHVVIXOUHFRPPHQGDWLRQPHWKRGWRSHUIRUPDXWRPDWHG recommendations based upon the assumption that users, who had similar interests in the past, will have VLPLODULQWHUHVWVLQIXWXUHWRR7KHN1HDUHVW1HLJKERU.11PHWKRGLVXVHGLQ&)WR¿QGWKHNQHDUHVW neighbors for a given user and to employ them in predicting the user’s interests. However, this method suffers from data sparseness and scalability, and often leads to poor recommendations. A number of UHFRPPHQGDWLRQPHWKRGRORJLHVIRUWKHLGHQWL¿FDWLRQRIWKHQHDUHVWQHLJKERUVKDYHEHHQSURSRVHGWR enhance the recommendation quality and system performance of the CF-based recommender systems. A methodology was developed based on web usage mining and product taxonomy (Cho and Kim, 2004). Web usage mining tracks customers’ shopping behaviors on the web and the product taxonomy is used to improve the performance of searching for nearest neighbors through dimensionality reduction of the customer preference database. Zeng et al. (2004) suggested a matrix conversion method to compress items into classes and an instance-selection method to narrow the scope of neighbor searching to improve WKHSHUIRUPDQFHRISUHGLFWLRQZLWKRXWVDFUL¿FLQJDFFXUDF\ One of the challenges of recommender systems is the need to adapt to an environment where users may have many completely different interests or may have completely different content. A hybrid CF PHWKRGZDVH[SORUHGE\FRPELQLQJ&)EDVHGRQLWHPDQGFROODERUDWLYH¿OWHULQJEDVHGRQXVHU/LHW al., 2005). Their algorithm analyzes the user-item matrix to identify similarity between the target item and other items, generates items similar to the target item, and determines neighbor users of the active user for the target item according to the similarity of other users to the active user based on similar items of the target item. Web Personalization E-business provided the ability to collect a vast amount of individual consumer data to the granularity of individual mouse movements. Coupled with the advances in one-to-one marketing strategies and Web mining technologies, e-business provided tremendous opportunities for web personalization. Web SHUVRQDOL]DWLRQLVWKHSURFHVVRIFXVWRPL]LQJDZHESDJHWRWKHQHHGVDQGSUHIHUHQFHVRIVSHFL¿FXVHUV XWLOL]LQJWKHNQRZOHGJHDFTXLUHGIURPWKHDQDO\VLVRIWKHXVHU¶VVHDUFKEHKDYLRUXVHUSUR¿OHDQGSUHIHU- ences. Since human involvement in the development of web personalization suffers from the problems of subjectivity and inadaptability, web mining has gained interest for web personalization in the areas xlvi of research and commerce. Web personalization techniques employed to analyze data collected from FXVWRPHUVLQFOXGHFRQWHQWEDVHG¿OWHULQJFROODERUDWLYH¿OWHULQJUXOHEDVHG¿OWHULQJDQGZHEXVDJH mining. A general architecture for automatic web personalization consists of: (1) the categorization and preprocessing of Web data, (2) the extraction of correlations between and across different kinds of data, and (3) the determination of the actions that should be recommended by a personalization system (Mobasher et al., 2000). Modules were presented that comprise a Web personalization system with an emphasis on the Web usage mining module, thus making the personalization process both automatic and dynamic, and hence up-to-date (Eirinaki and Vazirgiannis, 2003). They compared three different web usage mining tech- niques based on transaction clustering, usage clustering, and association rule discovery, to extract usage knowledge for the purpose of Web personalization. Combining the extracted knowledge with the current status of an ongoing web activity was also proposed to perform real-time personalization. 7KUHHZD\VRIWDLORULQJVHUYLFHVWRFXVWRPHUVH[LVW6DFNPDQQHWDO)LUVW¿UPVFDQRIIHU personalized services which build upon a one-to-one communication channel and utilize personal data for web personalization. Second, individualized services utilize the sequence of clicks, pages requested or items purchased, but do not require personal data. Since individualized services do not need to identify individual customers, they allow both improved shopping experience and consumers’ privacy. Third, universal services such as a product search engine or customer reputation systems need neither personal nor contextual data. Consumers can choose services dynamically for their needs. Privacy is a major concern for the success of personalization due to the extensive collection and use of personal and contextual data. Sackmann et al. (2006) suggested transparency with regard to the utilization of data is the only way to maintain privacy. The concept of privacy evidence was introduced as an initial step in this direction, as it permits an objective view into the data collected about a customer. Web Mining Web mining has become an important domain which aims to discover knowledge from the massive amount of transactional and clickstream data which e-commerce Web sites provide. Firms are utilizing web mining for web personalization, Web sites optimization, and one-to-one online marketing. Three web mining techniques have been widely used for e-commerce: content mining, structure mining, and usage mining. Web content mining focuses on the raw information available in Web pages and catego- rizes and/or ranks content of Web pages. Web structure mining focuses on the analysis of the structure of Web sites. Web sites are categorized based on the linking structure. Web usage mining focuses on the H[WUDFWLRQRINQRZOHGJHIURPVHUYHUORJ¿OHVFOLFNVWUHDPEHKDYLRUVDQGWUDQVDFWLRQDOGDWD When conducting a web mining task, the main decision is to choose a technique that is most suited for the problem domain under consideration. A number of data mining techniques have been suggested for web mining applications including: a divisive hierarchical clustering technique used to group Web site users according to their interests; sequential patterns technique used to predict the users behavior; DVVRFLDWLRQUXOHVXVHGWRDGGUHVVWKHSUREOHPRI&DFKLQJDQG3UHIHWFKLQJFODVVL¿FDWLRQWHFKQLTXHV used to classify Web sites to reorganize the Web site structure. No strict correlation was found between techniques and application domain (Facca & Lanzi, 2005). Practical guidelines for web mining usage include (Kohavi et al., 2004): Integrate data collection into operations to support analytics and experimentation and make it easy to transfer the collected information to a data warehouse; provide insight out-of-the-box and make it easy to derive insight and take action; provide simple reports and visualizations before building more complex models. Discussed challenges LQFOXGHWUDQVODWLQJEXVLQHVVTXHVWLRQVWRWKHGHVLUHGGDWDWUDQVIRUPDWLRQVGHYHORSLQJHI¿FLHQWDOJRULWKPV xlvii whose output is comprehensible and can handle multiple data types (dates, hierarchical attributes, dif- IHUHQWJUDQXODULW\GDWDDQGLQWHJUDWLQJZRUNÀRZIRUFRPSOH[PXOWLXVHUDQGPXOWLSURFHVVLQJZRUN environment. Organizational Learning and Knowledge Management Organizational learning and knowledge management are two integral parts of network enterprises, virtual enterprises, and other new IT-enabled organizational forms. E-business facilitates the process digitization RIRUJDQL]DWLRQDOOHDUQLQJDQGNQRZOHGJHPDQDJHPHQW+RZHYHU¿QGLQJHIIHFWLYHZD\VRIXWLOL]LQJH business tools and technologies for organizational learning and knowledge management is a challenge in the digital economy. Lin & Lee (2005) examined the impact of organizational learning factors (training available, technical expertise, and knowledge level) and knowledge management processes (knowledge acquisition, knowledge application, and knowledge sharing) on the e-business systems adoption level. Results of their survey showed that organizational learning factors and knowledge management processes are closely related to the level of e-business systems adoption. Knowledge management adds value in designing and managing e-business-enabled changes in or- ganizations (Beck, 2007; Ortega et al., 2008). In the digital economy, characterized by ubiquitous and RIWHQDXWRPDWHGLQIRUPDWLRQVKDULQJFDSDELOLWLHV¿UPVFDQXVHHEXVLQHVVNQRZOHGJHWRLPSURYHRUJD- nizational decision making, react more quickly to changes in the economic landscape, create dynamic custom content and consumer intimacy, and maintain competitive advantage (Warkentin et al., 2001). Leveraging e-business knowledge to enhance core business processes is the key to an organization’s success in deriving superior marketplace results. Through the use of e-business knowledge, organizations can achieve three critical tasks: (1) evaluate what type of work organizations are doing in the e-business environment (know-what); (2) understand how they are doing it (know-how); and (3) determine why certain practices and companies are likely to undergo change for the foreseeable future (know-why) (Fahey et al., 2001). Mobile Computing M-commerce ushered in a new wave of e-business evolution fueled by the increasing use of mobile devices such as cell phones and handheld devices. Although m-commerce can generally be considered to be an extension of electronic commerce, it has a number of unique characteristics and business models, as it embraces many emerging technologies. During the past several years, m-commerce has VLJQL¿FDQWO\FKDQJHGWKHZD\RUJDQL]DWLRQVGREXVLQHVVDQGHQWHUHGLQWRWKHFHQWHURIWKHHEXVLQHVV research and practices. Most m-commerce adopters are individuals who play the dual roles of technology user and service consumer. Coupled with the rapid advances in the wireless communications technolo- gies, m-commerce has enormous potential to become a dominant form of market mechanism. However, with m-commerce still in its infancy, we still need to explore opportunities and challenges posed by m-commerce, and identify the appropriate business models and business strategies for the success of m- commerce. In addition, the wireless networking infrastructure, W3C standards, and the open and global ZLUHOHVVDSSOLFDWLRQSURWRFRO:$3VSHFL¿FDWLRQQHHGWREHIXOO\HVWDEOLVKHGLQRUGHUWRWDNHDGYDQWDJH of m-commerce opportunities. The success of any mobile application requires a full understanding of application types, user requirements, technological constraints, and market potentials. The technology behind m-commerce and the products and services available were examined (Frolick DQG&KHQ7KH\DOVRH[DPLQHGWKHEHQH¿WVDQGFKDOOHQJHVRIPFRPPHUFHDVZHOODVWKHLVVXHV to be addressed when considering the implementation of m-commerce solutions. A number of studies xlviii addressed consumer perception and loyalty on m-commerce (Mahatanankoon et al., 2005; Mallat & Dahlberg, 2005; Jih, 2007). These studies reported that m-commerce consumer behaviors are similar to those of e-commerce, indicating that customer intention to use m-commerce is also affected by trust, habit, and customer satisfaction. Kim et al. (2007) adopted the theory of consumer choice and deci- sion making from economics and marketing research, and developed the Value-based Adoption Model (VAM), and explained customers’ m-commerce adoption from the value maximization perspective. The ¿QGLQJVGHPRQVWUDWHGWKDWFRQVXPHUV¶SHUFHSWLRQRIWKHYDOXHRIPFRPPHUFHLVDSULQFLSDOGHWHUPLQDQW of adoption intention. Organizational issues, key attributes in developing m-commerce, and the driving and impeding forces of m-commerce were also investigated (Bai et al., 2005). The unique characteristics of telecommunication markets along with the increasing trend for global e-business have led to a growing need for cross-national studies on m-commerce. Implications of m- commerce from a customer perspective across different countries were studied (Kim et al., 2004). Results IURPWKHRQOLQHVXUYH\LQWKUHHFRXQWULHV\LHOGHGWKHIROORZLQJ¿QGLQJV)LUVWDGRSWLRQSDWWHUQVIRUP commerce were different across the three countries. Second, customers’ perceptions of the importance RIWKHPFRPPHUFHDQGWKHLUZLOOLQJQHVVWRSD\IRUPFRPPHUFHVHUYLFHVGLIIHUHGVLJQL¿FDQWO\DPRQJ the different countries. Finally, customers’ preferred services in m-commerce also differed among the three countries. ORGANIZATIONAL AND SOCIAL IMPLICATIONS OF ELECTRONIC BUSINESS 7KLVVHFWLRQGLVFXVVHGVWUXFWXUDOFKDQJHVLQPDUNHWVLQWHU¿UPLQWHJUDWLRQYLUWXDOFRPPXQLWLHVGLJLWDO divide, and cybercrime. Structural Changes in Markets Structural changes in markets, such as disintermediation and re-intermediation have occurred due to WKHLPSDFWRIHFRPPHUFH$GHODDUH[DPLQHGWKHLQÀXHQFHRIHFRPPHUFHRQPDUNHWVWUXFWXUH and in particular the role of intermediaries. He observed that a purely economic perspective quickly over-generalizes the implications of e-commerce for the market structure. He suggested that a better understanding of the evolutionary impact of e-commerce on existing market structures and intermediary roles is achieved by taking into account both historical and regional perspectives. Inter-Firm Integration (EXVLQHVVKDVOHGWROHVVYHUWLFDOLQWHJUDWLRQDQGPRUHKRUL]RQWDOPHUJHUVDFTXLVLWLRQVDOOLDQFHVDV¿UPV specialize and partner with each other online. The Internet is facilitating less vertical integration due to lower transaction costs and globalization of sourcing in the vertical supply chain network. An example of this trend is the vertical disintegration of design, manufacturing, equipment production, and process development in the global semiconductor industry. Vertical disintegration has led to the rapid growth of semiconductor manufacturing capacity in Southeast Asia and the creation of new forms of international supply chain networks linking design and manufacturing specialists (Macher et al., 2002). The recent spate of horizontal mergers/acquisitions/alliances such as HP and Compaq, British Airline and American Airlines, and Chrysler and Daimler Benz may be attributable to the development e-com- merce technologies such as intranet and web-based groupware, which reduce agency costs dramatically. The horizontal integration leads to greater productivity and return on investment without incurring sig- xlix QL¿FDQWDJHQF\FRVWGLVHFRQRPLHV+RZHYHUWKHKRUL]RQWDOPHUJHUVDFTXLVLWLRQVDOOLDQFHVHIIHFWLYHO\ reliably and securely remain an important managerial challenge. Virtual Communities E-business has changed the way people interact with each other and enabled like-minded people to create virtual communities instantaneously from anywhere in the world. Virtual communities exhibit potential to become prominent business models structured around user interests and needs. Virtual communities can be an instrument for building relationships with customers, retaining customers’ loyalty, and generating PRUHSUR¿WV7DQHWDO$VYLUWXDOFRPPXQLWLHVJURZDWDQXQSUHFHGHQWHGUDWHLWLVLQFUHDVLQJO\ important for managers to understand the different types of virtual communities and community users, technological infrastructures, opportunities and challenges, and critical organizational and managerial issues such as communities-of-practice, virtual collaboration, and value creation. $¿HOGVXUYH\VKRZHGWKDWWKHOHYHORIFRPPXQLW\NQRZOHGJHVKDULQJDFWLYLW\LVSRVLWLYHO\UHODWHGWR YLUWXDOFRPPXQLW\RXWFRPHVDQGVXFKRXWFRPHVDUHVLJQL¿FDQWO\DVVRFLDWHGZLWKOR\DOW\WRWKHYLUWXDO community service provider, suggesting a need to integrate community knowledge sharing activity into a business activity in the form of an e-business model (Koh & Kim, 2004). Brand community is a special W\SHRIYLUWXDOFRPPXQLW\XVHGE\¿UPVDVDOHYHUIRUUHODWLRQVKLSPDUNHWLQJ$QGHUVHQ%UDQG communities not only provide companies with an additional communication channel but also allow the possibility of establishing linkages to devoted users. While certain marketing principles may still apply to virtual community marketing, marketers target- ing virtual communities should consider that community members: (1) are more active and discerning; (2) are less accessible to one-on-one processes, and (3) provide a wealth of valuable cultural information (Kozinets, 1999). Suggested strategies for effectively targeting more desirable types of virtual commu- nities and types of community members include: interaction-based segmentation, fragmentation-based segmentation, co-opting communities, paying-for-attention, and building networks by giving product DZD\7RUHDOL]HWKHSRWHQWLDOIRUVWUDWHJLFEHQH¿WVDQGPDUNHWRSSRUWXQLWLHVYLUWXDOFRPPXQLWLHVQHHG to develop a sound marketing strategy to improve their performance and to ensure strong value creation in the long term (Bughin & Hagel, 2000). Digital Divide While e-business transformed our society in many positive ways, some social scientists were beginning to carefully examine the policy implications of Internet access and usage by the general public and orga- nizations. Digital divide is an important issue for policymaking since it will affect access to technology, access to valuable information, individual learning, and organizational performance. For the general public, demographic variables like income, education, and race were major concerns because they are the most likely have a differential impact on the consequences of e-business for different segments in our society. For example, Gaps in general Web access and use between African-Americans and whites appear to be driven by whether or not there is a computer present in the home (Hoffman, et al., 2000). Digital divide also affects small and medium-sized enterprises (SMEs). Compared to large enterprises with strong IT infrastructures, SMEs face a number of barriers to the adoption of e-business technologies and techniques. The take-up of e-business by SMEs needs to be tempered with a more realistic view of KRZVPDOO¿UPVRSHUDWH7D\ORU0XUSK\ . VDWLVIDFWLRQLQ&&HFRPPHUFH5HOLDELOLWDQGUHVSRQVLYHQHVVLQÀXHQFHVDWLVIDFWLRQLQ&&HFRP- merce. ELECTRONIC BUSINESS DEVELOPMENT AND DESIGN METHODOLOGIES This section presents frameworks for e-business applications and design methodologies for e-business applications development. Frameworks. quality index and measuring web quality can help stakeholders understand and improve e-business web sites. Web quality metrics have been developed and validated through various e-business applications. . enterprises. ELECTRONIC BUSINESS TOOLS AND TECHNOLOGIES This section discusses web technology standards, agent technologies, and digital rights management (DRM) systems. Web Technology Standards One

Ngày đăng: 07/07/2014, 10:20

TỪ KHÓA LIÊN QUAN